Hi [[ session.user.profile.firstName ]]

Securing Finances with A Cloud Touch – A Shared-Responsibility

Digital transformations have been increasing at a very high rate and are changing drastically traditional business models. Adding more convenience, businesses are expanding their attack surface without often being aware.

A shared-responsibility model misunderstood or misinterpreted leads to recent major cyber attacks or hacks. An S3 bucket exposed, or else, the risks are not addressed at all in some cases.

In this presentation, I discuss how to undertake a cloud transformation, and what are the security and privacy concerns that need to be addressed before even taking the decision of moving to the cloud or choosing a cloud service provider.

I define the steps where security and privacy must be considered within the decision-making process and the transformation. Lastly, I help businesses achieve a digital resilience with tips and clear best practices achieved through real-life examples and case studies.

The objective is to identify fundamentals that would help to address cloud risks in alignment with security requirements and legislation limitations.
Recorded Aug 14 2018 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Magda Lilia Chelly, CISSP, PhD
Presentation preview: Securing Finances with A Cloud Touch – A Shared-Responsibility

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trends in Cyber Attacks and Breaches Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.


    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Best Practices for Data Protection in the Cloud Oct 23 2018 3:00 pm UTC 60 mins
    Dave Klein (Guardicore) | Panelists TBA
    As more corporate data moves to the cloud, the new challenge is to efficiently manage security in both the cloud and on premises. How are organizations coping with the data access governance and data security challenges?

    Join this keynote panel of security and cloud experts as they discuss:
    - Threats and cloud security challenges
    - Best practices for data access controls and data usage auditing
    - Encryption and authentication
    - Microsegmentation
    - Future trends in cloud security
  • Security in the Golden Age of Cloud Oct 23 2018 12:00 pm UTC 45 mins
    Emma Bickerstaffe, Senior Research Analyst, ISF LTD
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Key Threats on the Horizon and How to Protect Against Them Oct 22 2018 5:00 pm UTC 60 mins
    Sushila Nair (NTT DATA Services) | Panelists TBA
    The cyber threat landscape is constantly evolving and security professionals are struggling to secure an ever-expanding attack surface. Stay on top of the latest threats on the horizon for 2019 and get expert opinion on how to protect your organization against them.

    Join this keynote panel of security and cloud experts as they discuss:
    - Look into the most prevalent threats
    - Key behavioral characteristics and indicators of compromise
    - How to keep company data on cloud servers secure
    - Areas for automation
    - Best practices on how to secure your data and applications in the cloud
  • Privacy & Security in the Age of IoT Oct 2 2018 4:00 pm UTC 60 mins
    Panelists TBA
    This webinar is part of BrightTALK's Privacy Insights Series and National Cyber Security Awareness Month (NCSAM).

    With the proliferation of the Internet of Things into every sphere of our lives, it's now more important than ever to understand the security and privacy risks associated with connected devices. With smart home devices, office tools, children's toys, even medical devices being vulnerable to cyber attacks, becoming cyber aware should be a key priority for everyone.

    Join privacy and cyber security experts for an interactive panel roundtable discussion on:
    - The privacy and security vulnerabilities and risks stemming from IoT devices
    - The basic safety measures you can deploy to protect your home and workplace against cyber threats
    - Best practices for privacy and security safeguards
    - What to do in the event of a breach
    - What the future of privacy looks like

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • [Earn 1 CPE] Compliance vs Risk: Aligning Priorities & Prioritizing Threats Sep 27 2018 5:00 pm UTC 75 mins
    Colin Whittaker, Moderator. Stephen Boyer, CTO & Co-Founder, BitSight; Marc French, SVP at Mimecast
    Compliance is a fundamental pillar to effective risk management at any company. However, simply complying with laws and regulations without considering the broader threat landscape can result in disaster. Certainly, a balance between compliance and risk is necessary. Ensuring compliance represents an organization's starting point, not the endgame, should be a priority.

    In a dynamic threat environment, forward-thinking organizations have concluded that the goal of total protection is elusive and that a risk-based approach to governance and management of cybersecurity is necessary. That is easier said than done, as the way most information security professionals measure risk today fails to quantify threats in terms the business can understand and use. In this CPE accredited webinar, our panel of experts will discuss:

    - Aligning risk and compliance metrics and controls across functional domains.
    - Benchmarking existing process for managing the risks identified by stakeholders.
    - Creating a transparent 'system of record' and collaborative process life-cycle management system.
    - Prioritizing control efforts accordingly.
    - Aligning compliance investments with compliance risk ratings and business priorities.
  • Beyond the Breach: Recommendations for Effective Response Sep 19 2018 5:00 pm UTC 60 mins
    Heather Stratford-Geibel (Stronger.tech) | Sushila Nair (NTT DATA) | Vince Stross (ExtraHop)
    Discover the latest trends in cyber crime, your organization's vulnerabilities, and how to go about preventing, detecting and responding to a breach.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - Trends in breaches and cyber attacks
    - What to do (and not to do) after a breach
    - What's new on the threatscape
    - Best practices and recommendations for improving your security posture

    Speakers:
    - Heather Stratford-Geibel, CEO of Stronger.tech
    - Sushila Nair, Sr. Director, NTT DATA Services
    - Vince Stross, Sr. Security Software Engineer, ExtraHop
  • Next Generation Data Protection and Security: The Blockchain Advantage Sep 19 2018 3:00 pm UTC 60 mins
    Joseph Pindar (Gemalto), Ulf Mattsson (TokenEx), David Morris (Unit221B)
    How can Blockchain improve trust, security, and compliance? Can the decentralised nature of this technology be the missing piece in solving cybersecurity challenges?

    Listen in to this panel of security luminaries where they will discuss:
    -Key considerations for leveraging the blockchain in the age of GDPR
    -What sort of infrastructure must be in place to ensure a secure environment?
    -Is the blockchain itself secure?
    -How do you build a trust network around the blockchain?
    -What are some of the cybersecurity challenges that can be mitigated and managed by the blockchain?
  • Trends in Data Breaches and Comprehensive Response Sep 19 2018 12:00 pm UTC 60 mins
    Michelle Drolet (Towerwall) | David Klein (GuardiCore)
    Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience.

    Join this interactive Q&A panel with top security experts as they discuss:
    - The latest trends in data breach protection
    - Who's most at risk
    - How to detect breaches faster
    - What to do and not to do when it comes to breach response
    - Recommendations for CISOs for improving security

    Speakers:
    - Michelle Drolet, CEO, Towerwall
    - David Klein, Sr. Director Engineering & Architecture, GuardiCore
  • A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats Sep 18 2018 12:00 pm UTC 45 mins
    Nick Frost, Principal Consultant, ISF LTD
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • Privacy 101: Basic Overview and Tips for Organizations Sep 13 2018 3:00 pm UTC 60 mins
    Panelists TBA
    This webinar is part of BrightTALK's Privacy Insights Series.

    Join privacy and cyber security experts for an interactive discussion on:
    - What is Privacy and why should you care
    - Why all of a sudden everyone cares about Privacy
    - User/Customer expectations and reality
    - Data breaches prevention and notification
    - Crafting your Privacy Policy
    - Best recommendations for organizations

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • (CPE Webinar) GDPR 101: Monitoring & Maintaining Compliance After the Deadline Aug 28 2018 5:00 pm UTC 75 mins
    Dr. Branden Williams, Union Bank; Janalyn Schreiber, TrustArc; Eugene Tyrrell, OBS; Chris DePippo, DXC; Tim White, Qualys
    *All attendees stand a chance of winning a $100 Amazon Gift Card by attending this webinar.

    Achieving and maintaining GDPR compliance is a complex and expensive initiative for companies of all sizes, across all geographies and industries, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance.

    In June 2018, Dimensional Research on behalf of TrustArc surveyed 600 legal, information technology and privacy professionals, and found that 20% of companies surveyed believe they now are GDPR compliant, while 53% are in the implementation phase and 27% have not yet started their implementation. Now three months after deadline, it's clear that there is a lot work yet to be done in order for all companies to achieve full GDPR compliance.

    In this CPE accredited webinar, our panel of experts will discuss the main issues and attendees will learn:

    - The latest techniques to protect data and remediate breaches.
    - How GDPR can support your corporate values and drive business value for customers and partners.
    - What your organization needs to uncover data risks and avoid fines.
    - How technology can enable continuous monitoring, maintenance, and demonstration of GDPR compliance, in an ongoing and efficient manner.
  • The SNIA Persistent Memory Security Threat Model Aug 21 2018 5:00 pm UTC 75 mins
    Doug Voigt, Co-Chair, SNIA NVM Programming TWG and Distinguished Technologist, HPE
    What new security requirements apply to Persistent Memory (PM)? While many existing security practices such as access control, encryption, multi-tenancy and key management apply to persistent memory, new security threats may result from the differences between PM and storage technologies. The SNIA PM security threat model provides a starting place for exposing system behavior, protocol and implementation security gaps that are specific to PM. This in turn motivates industry groups such as TCG and JEDEC to standardize methods of completing the PM security solution space.
  • How to Build a Robust Incident Response Capability for Financial Institutions Recorded: Aug 16 2018 40 mins
    Michelle Drolet, CEO, Towerwall, Inc.
    Michelle Drolet CEO of Towerwall will be discussing the need for developing a solid Incident Response Program and doing Tabletop exercise throughout the year. An Incident Response Plan (IRP) will ensure information security incidents, once identified, will be handled and communicated appropriately. Consistency of how incidents are handled and communicated is paramount to a successful incident response.

    The IRP provides a quick, organized, and effective response to computer-related and physical security incidents. The IRP’s mission is to prevent a serious loss of information, information assets, property, and customer confidence by providing an immediate, effective, and informed response to any event involving your information systems, networks, workplace, or data.

    Security incident response is an organized approach to address and manage activities during and after a security breach. The goal of security incident response is to handle any information security incident in an organized and effective manner that limits damage to the organization and reduces recovery time and cost.
  • Should More Protection Really Equal More False Positives? Recorded: Aug 15 2018 30 mins
    Nir Gaist, Founder & CTO, Nyotron
    Security professionals accept the paradigm of “more protection equals more false positives (FPs)” as a fact of life. The tighter they make the “screws” of the security policies in their DLP, Web or Email Gateways, UEBA, application control/whitelisting and AV tools, the higher the likelihood something benign is misclassified as malicious. That’s why it is not uncommon to see false positive rates exceed 5% using the most aggressive settings.

    What if we were thinking about this wrong? Can we break this correlation between more security and more FPs?

    During this webinar we will briefly review the definition of false positives, false negatives, true positives and true negatives, as well as the history of “more protection = more FPs” paradigm. Then we will turn the paradigm on its head and discuss how more protection can actually mean fewer FPs.


    About the Speaker
    Nir Gaist, Founder and CTO of Nyotron, is a recognized information security expert and ethical hacker. He started programming at age 6 and began his studies at the Israeli Technion University at age 10. Nir has worked with some of the largest Israeli organizations, such as the Israeli Police, the Israeli parliament and Microsoft’s Israeli headquarters. He also wrote cybersecurity curriculum for the Israel Ministry of Education. Nir holds patents for the creation of a programming language called Behavior Pattern Mapping (BPM) that enables monitoring of the integrity of the operating system behavior to deliver threat-agnostic protection.
  • [Webcam Panel] Trends Discussed at Black Hat 2018 Recorded: Aug 15 2018 60 mins
    Charles Tendell (The Charles Tendell Show) | Eddie Lamb (6point6) | Other Panelists TBA
    Join this post-Black Hat panel as we look at the biggest trends and cyber threats covered during the Black Hat Conference 2018 in Las Vegas.

    Tune in for an interactive Q&A panel with industry experts across the security ecosystem as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    Speakers:
    - Charles Tendell, Renown Cybersecurity Expert, Certified Ethical Hacker & Host of "The Charles Tendell Show"
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • Disrupt Nothing: Cybersecurity for Inflexible Environments Recorded: Aug 15 2018 16 mins
    Ian Schmertzler, President & CFO of Dispel
    How do you go about defending a community that instinctively resists change and has the power to thwart you? You can try to alter human behavior, approach the problem through unobtrusive methods, or step aside and let a calamity educate the workforce. Since the last option isn’t really on the table while you are on the clock, a combination of the first two is the most likely approach. In this talk, we go through some readily implementable methods for narrowing the attack surface of your healthcare institution.

    About the Speaker:
    Ian Schmertzler is the President and CFO of Dispel, a cyberdefense firm that specializes in building traceless, encrypted communications networks within which teams and datasets can operate free from targeted attack. He also has a sense of humor, which is a necessity in cyberdefense. Ian holds an MSc. in Industrial Engineering from Georgia Tech, and a BA from Yale.
  • AI in the NHS: Transforming the Future of Healthcare Recorded: Aug 15 2018 45 mins
    Robin Smith, Head of Cyber Security Digital, NHS
    Robin Smith reviews the progress and impediments to transforming UK health care services in the age of AI.

    A specific focus is placed on the recent report by the UK-based Reform think tank and their 16 recommendations to overhaul current approaches to AI implementation.

    The session also review two cases studies on how AI is beginning to transform information protection.
  • How to Manage Cyber Risks in a Regulatory Environment with Security Analytics Recorded: Aug 14 2018 38 mins
    Ashwin Chaudhary, Accedere Inc
    With increased security and privacy regulations such as the new EU GDPR, it is becoming more important to reduce the dwell time of incidents to be able to report those breaches in the required time. For example GDPR requires you to report them in 72 hours.

    In this webinar, we will discuss how Security Analytics can help you do that including getting you ready for preventing, detecting and responding to breaches.

    Join us to know how Security Analytics as a Service can give you a better insight to your threats as well as optimize your compliance costs.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Finances with A Cloud Touch – A Shared-Responsibility
  • Live at: Aug 14 2018 8:00 am
  • Presented by: Magda Lilia Chelly, CISSP, PhD
  • From:
Your email has been sent.
or close